joshterrill / node-reverse-trojanLinks
An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.
☆16Updated 9 years ago
Alternatives and similar repositories for node-reverse-trojan
Users that are interested in node-reverse-trojan are comparing it to the libraries listed below
Sorting:
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- all scripts created/mentioned in blog mh4x0f☆7Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- Network aware keylogger: broadcasting on your local area network.☆20Updated 11 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 6 months ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Random stuff☆16Updated 6 years ago
- Exploit kit analyzer☆21Updated 10 years ago